Articoli correlati a Attribution of Advanced Persistent Threats: How to...

Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-espionage - Rilegato

 
9783662613122: Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-espionage

Sinossi

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.

Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.

This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sull?autore

Dr. Timo Steffens was involved in the analysis of many of the most spectacular cyber-espionage cases in Germany. He has been tracking the activities and techniques of sophisticated hacker groups for almost a decade.


Dalla quarta di copertina

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.

Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.

This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

The Content

  • Advanced Persistent Threats
  • The attribution process
  • Analysis of malware
  • Attack infrastructure
  • Analysis of control servers
  • Geopolitical analysis
  • Telemetry - data from security products 
  • Methods of intelligence agencies 
  • Doxing
  • False flags
  • Group set-ups
  • Communication
  • Ethics of attribution

The Target Audience

  • IT-security professionals
  • International relations researchers
  • Technical journalists
  • Employees of organizations that are targeted by Advanced Persistent Threats

The Author
Dr. Timo Steffens was involved in the analysis of many of the most spectacular cyber-espionage cases in Germany. He has been tracking the activities and techniques of sophisticated hacker groups for almost a decade.


Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreVieweg + Teubner Verlag
  • Data di pubblicazione2020
  • ISBN 10 3662613123
  • ISBN 13 9783662613122
  • RilegaturaCopertina rigida
  • LinguaInglese
  • Numero edizione1
  • Numero di pagine205
  • Contatto del produttorenon disponibile

Compra usato

Condizioni: buono
Item in good condition. Textbooks...
Visualizza questo articolo

EUR 30,68 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

EUR 9,70 per la spedizione da Germania a Italia

Destinazione, tempi e costi

Altre edizioni note dello stesso titolo

9783662613153: Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

Edizione in evidenza

ISBN 10:  3662613158 ISBN 13:  9783662613153
Casa editrice: Springer Vieweg, 2021
Brossura

Risultati della ricerca per Attribution of Advanced Persistent Threats: How to...

Foto dell'editore

Steffens, Timo
Editore: Springer Vieweg, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
Antico o usato Rilegato

Da: SecondSale, Montgomery, IL, U.S.A.

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00076233470

Contatta il venditore

Compra usato

EUR 22,59
Convertire valuta
Spese di spedizione: EUR 30,68
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Steffens, Timo
Editore: Springer Vieweg, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
Antico o usato Rilegato

Da: SecondSale, Montgomery, IL, U.S.A.

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Very Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00066071346

Contatta il venditore

Compra usato

EUR 22,59
Convertire valuta
Spese di spedizione: EUR 30,68
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Steffens, Timo
ISBN 10: 3662613123 ISBN 13: 9783662613122
Antico o usato Rilegato

Da: BooksRun, Philadelphia, PA, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Hardcover. Condizione: Good. 1st ed. 2020. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Codice articolo 3662613123-11-1

Contatta il venditore

Compra usato

EUR 20,47
Convertire valuta
Spese di spedizione: EUR 65,75
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Foto dell'editore

Steffens, Timo
ISBN 10: 3662613123 ISBN 13: 9783662613122
Antico o usato Rilegato

Da: BooksRun, Philadelphia, PA, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Hardcover. Condizione: Very Good. 1st ed. 2020. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Codice articolo 3662613123-8-1

Contatta il venditore

Compra usato

EUR 20,47
Convertire valuta
Spese di spedizione: EUR 65,75
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 3 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Timo Steffens
ISBN 10: 3662613123 ISBN 13: 9783662613122
Nuovo Rilegato
Print on Demand

Da: moluna, Greven, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Gebunden. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Explains how hackers operate and which mistakes they makePresents the technical methods to track and identify the perpetratorsCompares the approaches of security companies and government agencies. Codice articolo 388454337

Contatta il venditore

Compra nuovo

EUR 89,99
Convertire valuta
Spese di spedizione: EUR 9,70
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Timo Steffens
ISBN 10: 3662613123 ISBN 13: 9783662613122
Nuovo Rilegato
Print on Demand

Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Buch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats. 220 pp. Englisch. Codice articolo 9783662613122

Contatta il venditore

Compra nuovo

EUR 106,99
Convertire valuta
Spese di spedizione: EUR 11,00
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Foto dell'editore

Steffens, Timo (Author)
Editore: Springer Vieweg, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
Nuovo Rilegato

Da: Revaluation Books, Exeter, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Hardcover. Condizione: Brand New. 205 pages. 9.75x6.75x1.00 inches. In Stock. Codice articolo __3662613123

Contatta il venditore

Compra nuovo

EUR 110,00
Convertire valuta
Spese di spedizione: EUR 11,87
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Timo Steffens
ISBN 10: 3662613123 ISBN 13: 9783662613122
Nuovo Rilegato

Da: AHA-BUCH GmbH, Einbeck, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Buch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats. Codice articolo 9783662613122

Contatta il venditore

Compra nuovo

EUR 106,99
Convertire valuta
Spese di spedizione: EUR 14,99
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Timo Steffens
ISBN 10: 3662613123 ISBN 13: 9783662613122
Nuovo Rilegato
Print on Demand

Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Buch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.Springer Vieweg in Springer Science + Business Media, Abraham-Lincoln-Straße 46, 65189 Wiesbaden 220 pp. Englisch. Codice articolo 9783662613122

Contatta il venditore

Compra nuovo

EUR 106,99
Convertire valuta
Spese di spedizione: EUR 15,00
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Timo Steffens
ISBN 10: 3662613123 ISBN 13: 9783662613122
Nuovo Rilegato

Da: PBShop.store UK, Fairford, GLOS, Regno Unito

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

HRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo S0-9783662613122

Contatta il venditore

Compra nuovo

EUR 118,53
Convertire valuta
Spese di spedizione: EUR 6,24
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Vedi altre 1 copie di questo libro

Vedi tutti i risultati per questo libro